August 23, 2016

Exploitation 101

This is the beginning of the exploit development lectures. The fundamentals of processor architecture relevant to modern binary exploitation are covered. The stack is reviewed, and simple buffer overflows are explained.